Description
Arkei is an infostealer written in C++.
3299e669632f88fda64fc0e58292153b0528227b92732328c5edf17f7fe0f064
327KB
211226-mlbnpsaacj
7136567ae855946779cbe2f97248b680
fee8ac167894a508e24f442f545301eaa6892f99
3299e669632f88fda64fc0e58292153b0528227b92732328c5edf17f7fe0f064
3ec89dfef2508bdb6d24924ecbc4a5ad8ba4263e9fc64ccb799aafbb80db82f456932aa79cde0a70b215851c7a9852f1c0aa472c38d9faedbfc54627aca51328
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
3299e669632f88fda64fc0e58292153b0528227b92732328c5edf17f7fe0f064
7136567ae855946779cbe2f97248b680
327KB
fee8ac167894a508e24f442f545301eaa6892f99
3299e669632f88fda64fc0e58292153b0528227b92732328c5edf17f7fe0f064
3ec89dfef2508bdb6d24924ecbc4a5ad8ba4263e9fc64ccb799aafbb80db82f456932aa79cde0a70b215851c7a9852f1c0aa472c38d9faedbfc54627aca51328
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.